Tag Archives: network administration

A rudimentary OpenDRM

We all know that Open Source was to free ideas from incarceration, not deprive programmers of income. Here is a rudimentary “OpenDRM” scheme. Step 1 (Python script) Comments Updated Apr 22 Step 2 (Python script) – One possible “salt3” might … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

International Digital Encryption Algorithm implementation.

The IDEA cipher was subject to an attack more efficient than brute force, in 2012. Despite this, competent researchers still agree that the attack is not yet computationally feasible. If you’re a little nervous, here’s a way to harden your … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Can local OS security be improved, over Network security, by policing the NIC?

Local hard disk drives, and Network Access Storage systems are conceptually identical to the end user, particularly with respect to the browser application. However, the security considerations that affect a USB drive (whether 500GB or 8GB) connected to a router, … Continue reading

Posted in Uncategorized | Tagged , | Leave a comment

Two kinds of encrypted containers – accumulating without a password.

I wrote before that a mounted Truecrypt container is analogous to an un-encrypted file or drive. This is mirrored by other encryption schemes, and one safeguard against the implied problem is to keep an encrypted zip type file, that enciphers … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Family VPN gambit – a variation on the “Personal Cloud.”

“Personal Cloud” has been defined by usage as a person’s own slice of the world wide cloud. If a network administrator ran a family VPN on a private basis, he would be able to control the family’s own data and … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Predatory A.P.T.’s can corrupt backup systems.

In a research environment, where two companies are competing to build a proof of concept, or a prototype, a dirty trick an A.P.T. can employ, is to corrupt the backup stream. It is standard to do backups on a cycle. … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Why are backups hard to do?

Backups are hard to do because the reciprocal process of restoring data is complicated. A backup that cannot be restored is worse than no backup at all, since it has counterfeited peace of mind, with complacency. . Amateur administrators may … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment